Companies Home Search Profile

CISSP - 4th Edition

Focused View

20:17:00

0 View
  • 1.1 Organizational and Professional Ethics.mp4
    09:24
  • 2.1 Information and Cybersecurity Principles.mp4
    10:52
  • 3.1 Strategic Alignment.mp4
    11:55
  • 3.2 Organizational Roles and Responsibilities.mp4
    12:41
  • 3.3 Security Control Frameworks.mp4
    11:51
  • 4.1 Regulatory and Compliance Obligations.mp4
    10:58
  • 4.2 Intellectual Property & Transborder Data Flow.mp4
    11:47
  • 4.3 Privacy Principles.mp4
    12:39
  • 4.4 Cybercrime and Data Breaches.mp4
    11:26
  • 5.1 Investigation Objectives and Requirements.mp4
    10:36
  • 6.1 Governance Documents.mp4
    09:17
  • 7.1 Business Continuity Planning.mp4
    09:43
  • 7.2 Business Impact Analysis.mp4
    12:59
  • 8.1 Workforce Lifecycle Security.mp4
    11:30
  • 8.2 Workforce and Third-party Policies and Agreements.mp4
    10:03
  • 9.1 Risk Basics.mp4
    10:07
  • 9.2 Risk Assessment.mp4
    07:32
  • 9.3 Risk Analysis.mp4
    13:23
  • 9.4 Risk Response and Treatment.mp4
    11:34
  • 9.5 Risk Mitigation Controls.mp4
    07:52
  • 9.6 Risk Monitoring, Reporting, and Maturity.mp4
    07:54
  • 10.1 Threat Actors and Attributes.mp4
    14:06
  • 10.2 Attack Vectors - Digital Infrastructure.mp4
    10:30
  • 10.3 Attack Vectors - People.mp4
    17:13
  • 10.4 Attack Vectors - Code.mp4
    09:59
  • 10.5 Threat Modeling and Intelligence.mp4
    11:08
  • 11.1 Supply Chain Relationships and Risks.mp4
    08:48
  • 11.2 Supply Chain Risk Management and Mitigation.mp4
    08:23
  • 12.1 SETA Principles and Practices.mp4
    15:12
  • 12.2 Emerging SETA Trends, Techniques, and Topics.mp4
    08:28
  • 13.1 Asset Classification.mp4
    10:11
  • 14.1 Asset Handling Requirements.mp4
    09:11
  • 15.1 Asset Management.mp4
    09:02
  • 16.1 Data Management.mp4
    08:00
  • 16.2 Data Collection, Retention, and Archiving.mp4
    09:57
  • 16.3 Data Deletion and Media Destruction.mp4
    12:05
  • 17.1 Asset Retention and Retirement.mp4
    09:38
  • 18.1 Control Baselines.mp4
    10:56
  • 18.2 Data Protection Methods.mp4
    12:37
  • 19.1 Secure Design Principles.mp4
    10:04
  • 19.2 Zero Trust and Secure Access Service Edge (SASE).mp4
    11:40
  • 20.1 Information Security Models.mp4
    11:07
  • 21.1 Security Evaluation Criteria.mp4
    09:25
  • 22.1 Trusted Computing Base.mp4
    12:55
  • 23.1 Client-based, Server-based, and Distributed Systems.mp4
    09:31
  • 23.2 Database Management Systems.mp4
    10:50
  • 23.3 Operational Technology (OT).mp4
    09:22
  • 23.4 Cloud-based Systems.mp4
    15:02
  • 23.5 Internet of Things (IoT & IIoT) Systems.mp4
    10:01
  • 23.6 Virtualization.mp4
    10:38
  • 23.7 Automation and Solution Elements.mp4
    09:56
  • 24.1 Cryptography Primer.mp4
    11:00
  • 24.2 Encryption.mp4
    14:53
  • 24.3 Hashing and Digital Signatures.mp4
    14:51
  • 24.4 PKI and Digital Certificates.mp4
    11:25
  • 24.5 Emerging Cryptography.mp4
    09:34
  • 25.1 Cryptographic Attacks.mp4
    11:18
  • 25.2 Post-Exploitation Attacks.mp4
    08:25
  • 25.3 Ransomware.mp4
    09:18
  • 26.1 Physical Security Principles.mp4
    09:09
  • 27.1 Site and Building Controls.mp4
    10:45
  • 27.2 Environmental Impact.mp4
    10:38
  • 28.1 Information System Lifecycle.mp4
    08:18
  • 29.1 Network Models.mp4
    13:08
  • 29.2 Internet Protocol (IP).mp4
    12:42
  • 29.3 Secure Protocols.mp4
    12:33
  • 29.4 Multilayer and Converged Protocols.mp4
    09:38
  • 29.5 Transport Architecture.mp4
    07:37
  • 29.6 Segmentation.mp4
    08:53
  • 29.7 Microsegmentation.mp4
    06:57
  • 29.8 Wireless Architecture.mp4
    10:27
  • 29.9 Wi-Fi Networks.mp4
    12:23
  • 29.10 Virtual Private Cloud.mp4
    08:41
  • 29.11 Continuous Monitoring.mp4
    11:04
  • 30.1 Transmission Media.mp4
    09:30
  • 30.2 Network Access Control.mp4
    13:22
  • 30.3 Endpoint Security.mp4
    08:30
  • 31.1 Voice, Video, and Collaboration (CDN).mp4
    09:31
  • 31.2 Secure Remote Access Communications.mp4
    11:31
  • 32.1 Access Control Fundamentals.mp4
    14:03
  • 33.1 Identity Management (IdM).mp4
    09:11
  • 33.2 Authentication and Credential Management.mp4
    12:41
  • 33.3 Biometric Authentication.mp4
    08:23
  • 34.1 Federated Identity Management.mp4
    11:43
  • 35.1 Authorization and Access Controls.mp4
    12:24
  • 36.1 Identity and Access Management (IAM).mp4
    11:34
  • 37.1 Implementing Authentication Systems.mp4
    12:04
  • 37.2 Authentication and Access Control Attacks.mp4
    11:32
  • 38.1 Assessment and Audit Strategies.mp4
    09:34
  • 38.2 Planning Engagements.mp4
    09:38
  • 39.1 Vulnerability Testing and Assessment.mp4
    14:19
  • 39.2 Penetration Testing and Attack Simulations.mp4
    13:49
  • 39.3 Code and Interface Testing.mp4
    10:04
  • CISSP Introduction.mp4
    07:37
  • CISSP Introduction (1).mp4
    07:37
  • Learning objectives.mp4
    00:20
  • Learning objectives (1).mp4
    00:19
  • Learning objectives (2).mp4
    00:26
  • Learning objectives (3).mp4
    00:32
  • Learning objectives (4).mp4
    00:25
  • Learning objectives (5).mp4
    00:21
  • Learning objectives (6).mp4
    00:25
  • Learning objectives (7).mp4
    00:25
  • Learning objectives (8).mp4
    00:37
  • Learning objectives (9).mp4
    00:32
  • Learning objectives (10).mp4
    00:23
  • Learning objectives (11).mp4
    00:36
  • Learning objectives (12).mp4
    00:19
  • Learning objectives (13).mp4
    00:20
  • Learning objectives (14).mp4
    00:18
  • Learning objectives (15).mp4
    00:25
  • Learning objectives (16).mp4
    00:19
  • Learning objectives (17).mp4
    00:32
  • Learning objectives (18).mp4
    00:25
  • Learning objectives (19).mp4
    00:19
  • Learning objectives (20).mp4
    00:20
  • Learning objectives (21).mp4
    00:25
  • Learning objectives (22).mp4
    00:53
  • Learning objectives (23).mp4
    00:41
  • Learning objectives (24).mp4
    00:34
  • Learning objectives (25).mp4
    00:20
  • Learning objectives (26).mp4
    00:22
  • Learning objectives (27).mp4
    00:36
  • Learning objectives (28).mp4
    00:51
  • Learning objectives (29).mp4
    00:21
  • Learning objectives (30).mp4
    00:34
  • Learning objectives (31).mp4
    00:22
  • Learning objectives (32).mp4
    00:28
  • Learning objectives (33).mp4
    00:20
  • Learning objectives (34).mp4
    00:20
  • Learning objectives (35).mp4
    00:21
  • Learning objectives (36).mp4
    00:34
  • Learning objectives (37).mp4
    00:22
  • Learning objectives (38).mp4
    00:31
  • Lessons 1-5 Deep Dive Quiz.mp4
    11:38
  • Lessons 13 - 18 Deep Dive Quiz.mp4
    21:28
  • Lessons 19 - 22 Deep Dive Quiz.mp4
    12:40
  • Lessons 26 - 28 Deep Dive Quiz.mp4
    13:44
  • Lessons 30 - 31 Deep Dive Quiz.mp4
    09:59
  • Lessons 32 - 37 Deep Dive Quiz.mp4
    16:46
  • Lessons 38 - 39 Deep Dive Quiz.mp4
    11:47
  • Lesson 6 - 9 Deep Dive Quiz.mp4
    15:44
  • Lesson 10 - 12 Deep Dive Quiz.mp4
    12:59
  • Lesson 23 Deep Dive Quiz.mp4
    14:12
  • Lesson 24 - 25 Deep Dive Quiz.mp4
    16:22
  • Lesson 29 Deep Dive Quiz.mp4
    11:40
  • Module Introduction.mp4
    01:19
  • Module Introduction (1).mp4
    00:54
  • Module Introduction (2).mp4
    01:09
  • Module Introduction (3).mp4
    01:08
  • Module Introduction (4).mp4
    00:55
  • Module Introduction (5).mp4
    00:51
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 152
    • duration 20:17:00
    • Release Date 2025/01/15